Quaternary privacy-levels preservation in computer forensics investigation process

Privacy preservation and computer forensics investigation are two contradictory information security directions. The privacy preservation principle stress on utmost protection of users privacy as privacy is a right, whereas computer forensics investigation attempts to unearth user data for possible digital evidences hidden within them. Although, a number of research efforts have been directed towards privacy preservation during forensics investigation process and consequently, forensics tools are in existence, most of them employ binary privacy levels, i.e., user privacy is either fully protected or not at all. In this paper, we introduce the concept of quaternary privacy levels and their protection mechanism in computer forensics investigation process. The privacy levels are identified on the basis of different entities and their participation roles during a computer forensics investigation process and represent different granule of privacy that can be enforced by the court of law depending on the nature of crime to be investigated. We also re-define the forensics investigation steps to regard different privacy levels for an investigation process.

[1]  Philip Turner,et al.  Selective and intelligent imaging using digital evidence bags , 2006, Digit. Investig..

[2]  Robert Slade Software Forensics : Collecting Evidence from the Scene of a Digital Crime , 2004 .

[3]  Gregg H. Gunsch,et al.  An Examination of Digital Forensic Models , 2002, Int. J. Digit. EVid..

[4]  Eugene H. Spafford,et al.  An Event-Based Digital Forensic Investigation Framework , 2004 .

[5]  Philip Turner,et al.  Applying a forensic approach to incident response, network investigation and system administration using Digital Evidence Bags , 2007, Digit. Investig..

[6]  James P. Titus,et al.  Security and Privacy , 1967, 2022 IEEE Future Networks World Forum (FNWF).

[7]  Eugene H. Spafford Some Challenges in Digital Forensics , 2006, IFIP Int. Conf. Digital Forensics.

[8]  Nicole Beebe,et al.  Digital forensic text string searching: Improving information retrieval effectiveness by thematically clustering search results , 2007, Digit. Investig..

[9]  Peter Stephenson A comprehensive approach to digital incident investigation , 2003, Inf. Secur. Tech. Rep..

[10]  Paul Sanderson Mass image classification , 2006, Digit. Investig..

[11]  Ahmad Almulhem Network forensics: Notions and challenges , 2009, 2009 IEEE International Symposium on Signal Processing and Information Technology (ISSPIT).

[12]  S. Srinivasan Security and Privacy in the Computer Forensics Context , 2006, 2006 International Conference on Communication Technology.

[13]  Charles W. Adams Legal Issues Pertaining to the Development of Digital Forensic Tools , 2008, 2008 Third International Workshop on Systematic Approaches to Digital Forensic Engineering.

[14]  Nicole Beebe,et al.  A hierarchical, objectives-based framework for the digital investigations process , 2005, Digit. Investig..

[15]  Philip Turner,et al.  Digital provenance - interpretation, verification and corroboration , 2005, Digit. Investig..

[16]  Philip Turner,et al.  Unification of Digital Evidence from Disparate Sources (Digital Evidence Bags) , 2005, DFRWS.

[17]  A Min Tjoa,et al.  Towards More Trustable Log Files for Digital Forensics by Means of “Trusted Computing” , 2010, 2010 24th IEEE International Conference on Advanced Information Networking and Applications.

[18]  Peter Stephenson The Forensic Investigation Steps , 2002 .

[19]  Carsten Rudolph,et al.  Security Digital Evidence , 2010, 2010 Fifth IEEE International Workshop on Systematic Approaches to Digital Forensic Engineering.

[20]  Yvo Desmedt,et al.  Security or Privacy , Must We Choose ? , 2001 .

[21]  Claudia Eckert,et al.  Securing Digital Evidence , 2009 .

[22]  Nicole Beebe,et al.  Dealing with Terabyte Data Sets in Digital Investigations , 2005 .

[23]  Erin E. Kenneally,et al.  Risk sensitive digital evidence collection , 2005, Digit. Investig..

[24]  M. B. Mukasey,et al.  Electronic Crime Scene Investigation: A Guide for First Responders, Second Edition , 2008 .

[25]  Eugene H. Spafford,et al.  Getting Physical with the Digital Investigation Process , 2003, Int. J. Digit. EVid..

[26]  G. Richard,et al.  Breaking the Performance Wall: The Case for Distributed Digital Forensics , 2004 .

[27]  Nicole Beebe,et al.  Digital Forensic Research: The Good, the Bad and the Unaddressed , 2009, IFIP Int. Conf. Digital Forensics.